Skip to main content

Advertisement

Log in

A study on trust-rating mechanism for WSN node sensors using evolutionary game theory

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

This paper addresses the critical security challenge posed by Sybil attacks in wireless sensor networks (WSNs), where a single node impersonates multiple identities to disrupt network operations. We propose a novel trust-rating mechanism based on evolutionary game theory, which incorporates incentives to foster cooperation and deter malicious behavior. By adjusting parameters such as P, \(\omega _{T}\), \(\varphi\), and \(\alpha\), network operators can guide the evolution of strategies toward desirable outcomes, including complete collaboration \(x_{2} = 1\). The stability of \(x_{2}\) ensures robust defense against Sybil attacks, while \(x_{3}^{*}\) identifies conditions under which partial collaboration may persist. Rigorous mathematical analysis and proofs support the mechanism’s foundation, showing that under favorable conditions (Theorem 2), collaboration strategies dominate, ensuring communication stability within the WSN. The derivation of evolutionarily stable strategies (ESS) demonstrates that system dynamics favor cooperation, which is validated through OMNET++ simulations. The results confirm the mechanism’s effectiveness in achieving ESS and enhancing WSN security, achieving a high true detection rate (TDR) of 99.8% and a low false detection rate (FDR) of 0.8%, outperforming existing Sybil detection methods.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Algorithm 1
Algorithm 2
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

Data availability

The data that support the findings of this study are available from the corresponding author upon reasonable request.

Code availability

The codes supporting this study’s findings are available from the corresponding author upon reasonable request.

References

  1. Cheng Y, Liu Y, Zhang Z, Li Y (2023) An asymmetric encryption-based key distribution method for wireless sensor networks. Sensors 14(23):6460. https://doi.org/10.3390/s23146460

    Article  MATH  Google Scholar 

  2. Yang S, Wei W, He Z (2015) A lightweight white-box symmetric encryption algorithm against node capture for wsns †. Sensors 15(5):11928–11952. https://doi.org/10.3390/s150511928

    Article  MATH  Google Scholar 

  3. Ssu FK, Wang TW, Chang CW (2009) Detecting sybil attacks in wireless sensor networks using neighboring information. Computer Commun 18(53):3042–3056. https://doi.org/10.1016/j.comnet.2009.07.013

    Article  MATH  Google Scholar 

  4. Aslam M, Derhab A, Saleem K, Abbas H, Orgun M, Iqbal W, Aslam B (2017) A survey of authentication schemes in telecare medicine information systems. J Med syst 41:1–26. https://doi.org/10.1007/s10916-016-0658-3

    Article  MATH  Google Scholar 

  5. Shen S, Cai C, Shen Y, Wu X, Ke V, Yu S (2024) Mfgd3qn: enhancing edge intelligence defense against ddos with mean-field games and dueling double deep q-network. IEEE Internet Things J 13(11):23931–23945. https://doi.org/10.1109/JIOT.2024.3387090

    Article  MATH  Google Scholar 

  6. Jabor MS, Azez AS, Campelo JC, Bonastre Pina A (2023) New approach to improve power consumption associated with blockchain in wsns. J Plos Org 18(5):0285924. https://doi.org/10.1371/journal.pone.0285924

    Article  Google Scholar 

  7. Xia Z, Wei Z, Zhang H (2022) Review on security issues and applications of trust mechanism in wireless sensor networks. Computat Intell Neurosci 1:0285924. https://doi.org/10.1155/2022/3449428

    Article  MATH  Google Scholar 

  8. Abdalzaher MS, Seddik K, Elsabrouty M, Muta O, Furukawa H, Abdel-Rahman A (2016) Game theory meets wireless sensor networks security requirements and threats mitigation. Sensors 7(16):1003. https://doi.org/10.3390/s16071003

    Article  Google Scholar 

  9. Chen Z, Tian L (2017) Lin, C: Trust model of wireless sensor networks and its application in data fusion. Sensors 4(17):703. https://doi.org/10.3390/s17040703

    Article  MATH  Google Scholar 

  10. Babu SS, Raha A, Naskar KM (2012) Lsr protocol based on nodes potentiality in trust and residual energy for wsns. Int J Netw Secur Appl 2(4):21. https://doi.org/10.5121/ijnsa.2012.4202

    Article  Google Scholar 

  11. Shen Y, Ahmed CM, Shen S, Shen Y, Wu X, Ke W, Yu S (2024) Game-theoretic analytics for privacy preservation in internet of things networks. A survey. Eng Appl Artif Intell 133(1):08449. https://doi.org/10.1016/j.engappai.2024.108449

    Article  MATH  Google Scholar 

  12. Slifka K, Whitton JL (2000) Clinical implications of dysregulated cytokine production. J Mole Med 78:74–80. https://doi.org/10.1007/s001090000086

    Article  MATH  Google Scholar 

  13. Govindan K, Mohapatra P (2011) Trust computations and trust dynamics in mobile adhoc networks: a survey. IEEE Commun Surv Tutor 2(14):279–298. https://doi.org/10.1109/SURV.2011.042711.00083

    Article  MATH  Google Scholar 

  14. Rafeh R, Khodadadi M (2014) Detecting sybil nodes in wireless sensor networks using two-hop messages. Indian J Sci Technolog 9(7):1359–1368

    Article  MATH  Google Scholar 

  15. Momani M (2010) Trust models in wireless sensor networks a survey. Proceed Recent Trends Netw Secur Appl 2(69):37–46. https://doi.org/10.1007/978-3-642-14478-3_4

    Article  MATH  Google Scholar 

  16. Sun Y, Luo H, Das SK (2012) A trust-based framework for fault-tolerant data aggregation in wireless multimedia sensor networks. IEEE Trans Depend Secure Comput 6(9):785–797. https://doi.org/10.1109/TDSC.2012.68

    Article  MATH  Google Scholar 

  17. Wang X (2013) An evolutionary game-based trust cooperative stimulation model for large scale manets. Int J Distrib Sensor Netw 6(9):245017. https://doi.org/10.1155/2013/245017

    Article  Google Scholar 

  18. M M, S C (2010) Survey of trust models in different network domains. International Journal of Ad Hoc. Sensor & Ubiquitous Computing https://doi.org/10.48550/arXiv.1010.0168

  19. Vellela SS, Balamanigandan R (2024) An efficient attack detection and prevention approach for secure wsn mobile cloud environment. Soft Comput 15(1):1–15. https://doi.org/10.1007/s00500-024-09891-w

    Article  Google Scholar 

  20. Srinivasan S, Ramesh KTRP, Fanucci L (2022) Industrial functional safety assessment for wsn using qos metrics. Heliyon 8(11):562–583. https://doi.org/10.1016/j.heliyon.2022.e11255

    Article  MATH  Google Scholar 

  21. Chen K, Lee FL, Chiu W, Su C, Yeh HK, Chao HC (2023) A trusted reputation management scheme for cross-chain transactions. Sensors 13(23):6033. https://doi.org/10.3390/s23136033

    Article  MATH  Google Scholar 

  22. Yu H, Shen Z, Miao C, Leung C, Niyato D (2010) Aa survey of trust and reputation management systems in wireless communications. Proceed IEEE 10(98):1755–1772. https://doi.org/10.1109/JPROC.2010.2059690

    Article  MATH  Google Scholar 

  23. Li Jie, Wang Z (2024) Sybil attack detection for secure iot-based smart healthcare environments. J Instit Eng (India), 1–13 https://doi.org/10.1007/s40031-024-01060-9

  24. Kim T Kyung, Seo Suk H (2008) A trust model using fuzzy logic in wireless sensor network. World Acad Sci Eng Technology 6(42):63–66

    MATH  Google Scholar 

  25. Liu Y (2021) An evolutionary game-based secure clustering protocol with fuzzy trust evaluation and outlier detection for wireless sensor networks. IEEE Sensors J 21 21:13935–13947. https://doi.org/10.1016/0025-5564(78)90077-9

    Article  Google Scholar 

  26. Ganeriwal S, Balzano LK, Srivastava MB (2016) Reputation-based framework for high integrity sensor networks. ACM Trans Sensor Netw (TOSN) 3(4):1–37. https://doi.org/10.1145/1362542.1362546

    Article  MATH  Google Scholar 

  27. Yao Z, Kim D, Doh Y (2006) Eplus: parameterized and localized trust management scheme for sensor networks security. IEEE Int Conf Mobile Ad Hoc Sensor Syst 3(4):437–446. https://doi.org/10.1109/MOBHOC.2006.278584

    Article  MATH  Google Scholar 

  28. Chen H, Z Xa., Wu H, Gao C (2007) Areputation and trust mathematical approach for wireless sensor networks. In: Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007). 2(4):521–534

  29. Zi-Chuan L, Shi-gen SHEN, Qi-ying CAO (2016) Evolutionary trust model of wsns nodes based on review mechanism. Appl Res Computers 3(4):1528. https://doi.org/10.3969/j.issn.1001-3695.2014.05.059

    Article  MATH  Google Scholar 

  30. Feng R, Xu X, Zhou X, Wan J (2011) A trust evaluation algorithm for wireless sensor networks based on node behaviors and ds evidence theory. Sensors 2(11):1345–1360. https://doi.org/10.3390/s110201345

    Article  MATH  Google Scholar 

  31. Almas SR, Faez K, Eshghi F, Kelarestaghi M (2017) A new lightweight watchdog-based algorithm for detecting sybil nodes in mobile wsns. Future Internet 1(10):1–17. https://doi.org/10.3390/fi10010001

    Article  Google Scholar 

  32. Shen Y, Shen V, Li Q, Zhou H, Wu Z, Qu Y (2023) Evolutionary privacy-preserving learning strategies for edge-based iot data sharing schemes. Digital Commun Netw 9(4):906–919. https://doi.org/10.1016/j.dcan.2022.05.004

    Article  MATH  Google Scholar 

  33. Alrahhal H, Jamous R, Ra Ramadan AAM, Yadavand K (2022) Utilising acknowledge for the trust in wireless sensor networks. Sensors 12(4):204. https://doi.org/10.3390/app12042045

    Article  Google Scholar 

  34. Lin J, Naixue Xiong, Vasilakos VA, Guo W (2011) Evolutionary game-based data aggregation model for wireless sensor networks. IET Commun 12(5):1691–1697. https://doi.org/10.1049/iet-com.2010.0794

    Article  MathSciNet  MATH  Google Scholar 

  35. Jiang J, Han G, Wang F, Shu L, Guizani M (2015) An efficient distributed trust model for wireless sensor networks. IEEE Trans Parall Distrib Syst 26(5):1228–1237. https://doi.org/10.1109/TPDS.2014.2320505

    Article  MATH  Google Scholar 

  36. Shen Y, Shen S, Li Q, Zhou H, Wu Z, Qu Y (2019) Evolutionary privacy-preserving learning strategies for edge-based iot data sharing schemes. Digital Commun Netw 4(9):906–919. https://doi.org/10.1016/j.dcan.2022.05.004

    Article  MATH  Google Scholar 

  37. Wang Y, Mahmood A, Sabri MFM, Zen H, Kho LC (2024) Mesmeric: machine learning-based trust management mechanism for the internet of vehicles. Sensors 24(3):863. https://doi.org/10.3390/s24030863

    Article  Google Scholar 

  38. Cho JH, Swami A, Chen R (2011) A survey on trust management for mobile ad hoc networks. IEEE Commun Surv Tutor 4(13):562–583. https://doi.org/10.1109/SURV.2011.092110.00088

    Article  MATH  Google Scholar 

  39. Chen Z, Qiu Y, Liu J, Xu L (2011) Incentive mechanism for selfish nodes in wireless sensor networks based on evolutionary game. Computers Mathem Appl 9(62):3378–3388. https://doi.org/10.1016/j.camwa.2011.08.052

    Article  MathSciNet  MATH  Google Scholar 

  40. Rinki R, Kumar S, Dohare U (2019) Trust evaluation for light weight security in sensor enabled internet of things: game theory oriented approach. IEEE Internet Things J 5(6):8421–8432. https://doi.org/10.1109/JIOT.2019.2917763

    Article  MATH  Google Scholar 

  41. Chen H, Wu H, Zhou X, Gao C (2007) Agent-based trust model in wireless sensor networks. IEEE 3:119–124. https://doi.org/10.1109/SNPD.2007.122

    Article  MATH  Google Scholar 

  42. Chen Z, Qiao C, Xu L, Wu W (2014) Optimizing wireless unicast and multicast sensor networks on the basis of evolutionary game theory. Concurr Comput: Practice Exper 5(26):1130–1141. https://doi.org/10.1002/cpe.3060

    Article  MATH  Google Scholar 

  43. Misra S, Myneni S (2010) On identifying power control performing sybil nodes in wireless sensor networks using rssi. In InGlobal Telecommunications Conference, 1–5 https://doi.org/10.1109/GLOCOM.2010.5683728

  44. Liu J, Yue G, Shen S, Shang H, Li H (2014) Coverage capacity optimization for mobile sensor networks based on evolutionary games. Concurr Comput: Practice Exper 11(10):264307. https://doi.org/10.1155/2014/264307

    Article  Google Scholar 

  45. Na Farzaneh, Yaghmaee MH (2015) An adaptive competitive resource control protocol for alleviating congestion in wireless sensor networks: an evolutionary game theory approach. Wirel Person Commun 82(1):123–142. https://doi.org/10.1007/s11277-014-2198-9

    Article  MATH  Google Scholar 

  46. Jiang Guanxiong, Shen Shigen, Hu K, Huang Longjun, Li Hongjie, Han Risheng (2015) Evolutionary game-based secrecy rate adaptation in wireless sensor networks. Int J Distrib Sensor Netw 11(3):264307. https://doi.org/10.1155/2015/975454

    Article  Google Scholar 

  47. Sun V, Shen S, Wu Z, Zhou H, Gao XZ (2022) Stimulating trust cooperation in edge services An evolutionary tripartite game. Eng Appl Artif Intell 116:105465. https://doi.org/10.1016/j.engappai.2022.105465

    Article  Google Scholar 

  48. Abd MA, Al-Rubeaaiand SFM, Singh BK, Tepe KE, Benlamri R (2015) Extending wireless sensor network lifetime with global energy balance. Int J Distrib Sensor Netw 15(9):5053–5063. https://doi.org/10.1109/JSEN.2015.2432114

    Article  MATH  Google Scholar 

  49. Jamshidi M, Ranjbari M, Esnaashari M, Qader NN, Meybodi MR (2018) Sybil node detection in mobile wireless sensor networks using observer nodes. Int J Inform Visual 3(2):159–165. https://doi.org/10.30630/joiv.2.3.131

    Article  MATH  Google Scholar 

  50. Shigen Shen et al (2016) Trust dynamics in wsns: an evolutionary game-theoretic approach. J Sensors 1(2016):4254701. https://doi.org/10.1155/2016/4254701

    Article  MATH  Google Scholar 

  51. Kumar B (2024) Bhuyan: game theoretic defense framework against sybil attacks. SN Computer Sci 7(5):857. https://doi.org/10.1007/s42979-024-03153-0

    Article  MATH  Google Scholar 

  52. Zhu C, Nicanfar H, Leung VCM, Yang LT (2015) An authenticated trust and reputationcalculationandmanagement system for cloud and sensor networks integration. IEEE Trans Inform Forens Secur 10(1):118–131

    Article  MATH  Google Scholar 

  53. Li X, Zhou F, Du J (2013) Ldts: a lightweight and dependable trust system for clustered wireless sensor networks. IEEE Trans Inform Forens Secur 8(6):924–935. https://doi.org/10.1109/TIFS.2013.2240299

    Article  MATH  Google Scholar 

Download references

Funding

No funds, grants, or other support was received.

Author information

Authors and Affiliations

Authors

Contributions

All authors contributed to the study’s conception and design.

Corresponding author

Correspondence to Hamid Haj Seyyed Javadi.

Ethics declarations

Conflict of interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Ethics approval and consent to participate

All authors certify that they have no affiliations with or involvement in any organization or entity with any financial interest or non-financial interest in the subject matter or materials discussed in this manuscript.

Consent for publication

We, the authors, give our consent for the publication of identifiable information.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Navaei Tourani, A., Haj Seyyed Javadi, H., Navidi, H. et al. A study on trust-rating mechanism for WSN node sensors using evolutionary game theory. J Supercomput 81, 401 (2025). https://doi.org/10.1007/s11227-024-06824-0

Download citation

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11227-024-06824-0

Keywords